Sciweavers

2199 search results - page 405 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
IJWMC
2010
103views more  IJWMC 2010»
14 years 9 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
127
Voted
JMLR
2010
165views more  JMLR 2010»
14 years 7 months ago
Feature Selection: An Ever Evolving Frontier in Data Mining
The rapid advance of computer technologies in data processing, collection, and storage has provided unparalleled opportunities to expand capabilities in production, services, comm...
Huan Liu, Hiroshi Motoda, Rudy Setiono, Zheng Zhao
106
Voted
ICDCS
2005
IEEE
15 years 6 months ago
Flexible Consistency for Wide Area Peer Replication
The lack of a flexible consistency management solution hinders P2P implementation of applications involving updates, such as read-write file sharing, directory services, online ...
Sai Susarla, John B. Carter
127
Voted
IJMSO
2007
201views more  IJMSO 2007»
15 years 12 days ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
110
Voted
ICC
2009
IEEE
136views Communications» more  ICC 2009»
15 years 7 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku